The key to information security is protecting information and information systems from unauthorized access through various means. Some common methods of securing information include encryption, authentication, passwords, digital signatures, and controlling access. Public key encryption uses a private and public key system where the private key is known only to the user and the public key can be shared more widely. Encryption scrambles data using an algorithm and key to make it unreadable without the proper key.